Sciweavers

1553 search results - page 89 / 311
» Democracy Functions of Information Technology
Sort
View
90
Voted
ISW
2007
Springer
15 years 6 months ago
Specifying Imperative Data Obfuscations
Abstract. An obfuscation aims to transform a program, without affecting the functionality, so that some secret information within the program can be hidden for as long as possible...
Stephen Drape, Clark D. Thomborson, Anirban Majumd...
135
Voted
DAWAK
2009
Springer
15 years 5 months ago
What Is Spatio-Temporal Data Warehousing?
Abstract. In the last years, extending OLAP (On-Line Analytical Processing) systems with spatial and temporal features has attracted the attention of of the GIS (Geographic Informa...
Alejandro A. Vaisman, Esteban Zimányi
CIKM
2008
Springer
15 years 2 months ago
Estimating the number of answers with guarantees for structured queries in p2p databases
Structured P2P overlays supporting standard database functionalities are a popular choice for building large-scale distributed data management systems. In such systems, estimating...
Marcel Karnstedt, Kai-Uwe Sattler, Michael Ha&szli...
99
Voted
WSC
1996
15 years 2 months ago
Controlling Activities in a Virtual Manufacturing Cell
Researchers at the National Institute of Standards and Technology are developing a virtual manufacturing cell. This cell will contain simulation models of a wide range of manufact...
Michael Iuliano, Albert Jones
103
Voted
WWW
2009
ACM
16 years 1 months ago
Detecting image spam using local invariant features and pyramid match kernel
Image spam is a new obfuscating method which spammers invented to more effectively bypass conventional text based spam filters. In this paper, we extract local invariant features ...
Haiqiang Zuo, Weiming Hu, Ou Wu, Yunfei Chen, Guan...